There are all these fuzzy topics in cybersecurity. And then there’s “check your logs for suspicious and unauthorized activity and ensure your configurations have not been tampered with”.

Comments